Across
- 4. Software designed to harm or exploit computer systems.
- 9. Deceptive attempts to acquire sensitive information via email.
- 10. (4,3)Exploits unknown vulnerabilities, posing a high risk.
- 13. (6,11)Manipulating individuals to divulge confidential information.
- 14. (5,3) Ethical hackers who use their skills to help organisations improve security.
- 15. The boundary or border of a network, often protected by firewalls.
- 16. Unauthorised access or breach into system.
- 17. Protects data by converting it into a secret code.
- 18. (3,6)Enhanced security requiring authentication through two distinct methods.
Down
- 1. Weaknesses in a system that can be exploited.
- 2. (8,8) A structured approach to address and manage the aftermath of a cyber incident.
- 3. Updating software to fix vulnerabilities and improve security.
- 5. The point at which a device connects to a network, vulnerable to cyber threats.
- 6. Malicious software that encrypts files and demands payment for their release.
- 7. Verifying the identity of a user.
- 8. A secret word or code needed to gain access.
- 11. Acts as a barrier to prevent unauthorised access.
- 12. Authentication based on unique physical or behavioural characteristics.
